Lucene search

K
nvd[email protected]NVD:CVE-2012-4414
HistoryJan 22, 2013 - 11:55 p.m.

CVE-2012-4414

2013-01-2223:55:02
CWE-89
web.nvd.nist.gov

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

7.5 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

53.7%

Multiple SQL injection vulnerabilities in the replication code in Oracle MySQL possibly before 5.5.29, and MariaDB 5.1.x through 5.1.62, 5.2.x through 5.2.12, 5.3.x through 5.3.7, and 5.5.x through 5.5.25, allow remote authenticated users to execute arbitrary SQL commands via vectors related to the binary log. NOTE: as of 20130116, Oracle has not commented on claims from a downstream vendor that the fix in MySQL 5.5.29 is incomplete.

Affected configurations

NVD
Node
oraclemysqlRange5.5.28
OR
oraclemysqlMatch5.1.51
OR
oraclemysqlMatch5.1.52
OR
oraclemysqlMatch5.1.52sp1
OR
oraclemysqlMatch5.1.53
OR
oraclemysqlMatch5.1.54
OR
oraclemysqlMatch5.1.55
OR
oraclemysqlMatch5.1.56
OR
oraclemysqlMatch5.1.57
OR
oraclemysqlMatch5.1.58
OR
oraclemysqlMatch5.1.59
OR
oraclemysqlMatch5.1.60
OR
oraclemysqlMatch5.1.61
OR
oraclemysqlMatch5.1.62
OR
oraclemysqlMatch5.1.63
OR
oraclemysqlMatch5.1.64
OR
oraclemysqlMatch5.1.65
OR
oraclemysqlMatch5.1.66
OR
oraclemysqlMatch5.1.67
OR
oraclemysqlMatch5.5.10
OR
oraclemysqlMatch5.5.11
OR
oraclemysqlMatch5.5.12
OR
oraclemysqlMatch5.5.13
OR
oraclemysqlMatch5.5.14
OR
oraclemysqlMatch5.5.15
OR
oraclemysqlMatch5.5.16
OR
oraclemysqlMatch5.5.17
OR
oraclemysqlMatch5.5.18
OR
oraclemysqlMatch5.5.19
OR
oraclemysqlMatch5.5.20
OR
oraclemysqlMatch5.5.21
OR
oraclemysqlMatch5.5.22
OR
oraclemysqlMatch5.5.23
OR
oraclemysqlMatch5.5.24
OR
oraclemysqlMatch5.5.25
OR
oraclemysqlMatch5.5.25a
OR
oraclemysqlMatch5.5.26
OR
oraclemysqlMatch5.5.27
Node
mariadbmariadbMatch5.1.41
OR
mariadbmariadbMatch5.1.42
OR
mariadbmariadbMatch5.1.44
OR
mariadbmariadbMatch5.1.47
OR
mariadbmariadbMatch5.1.49
OR
mariadbmariadbMatch5.1.50
OR
mariadbmariadbMatch5.1.51
OR
mariadbmariadbMatch5.1.53
OR
mariadbmariadbMatch5.1.55
OR
mariadbmariadbMatch5.1.60
OR
mariadbmariadbMatch5.1.61
OR
mariadbmariadbMatch5.1.62
Node
mariadbmariadbMatch5.2.0
OR
mariadbmariadbMatch5.2.1
OR
mariadbmariadbMatch5.2.2
OR
mariadbmariadbMatch5.2.3
OR
mariadbmariadbMatch5.2.4
OR
mariadbmariadbMatch5.2.5
OR
mariadbmariadbMatch5.2.6
OR
mariadbmariadbMatch5.2.7
OR
mariadbmariadbMatch5.2.8
OR
mariadbmariadbMatch5.2.9
OR
mariadbmariadbMatch5.2.10
OR
mariadbmariadbMatch5.2.11
OR
mariadbmariadbMatch5.2.12
Node
mariadbmariadbMatch5.3.0
OR
mariadbmariadbMatch5.3.1
OR
mariadbmariadbMatch5.3.2
OR
mariadbmariadbMatch5.3.3
OR
mariadbmariadbMatch5.3.4
OR
mariadbmariadbMatch5.3.5
OR
mariadbmariadbMatch5.3.6
OR
mariadbmariadbMatch5.3.7
Node
mariadbmariadbMatch5.5.20
OR
mariadbmariadbMatch5.5.21
OR
mariadbmariadbMatch5.5.22
OR
mariadbmariadbMatch5.5.23
OR
mariadbmariadbMatch5.5.24
OR
mariadbmariadbMatch5.5.25

6.5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

7.5 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

53.7%